The vulnerability, tracked as CVE-2023-29336, is rated 7.8 for severity and concerns an elevation of privilege bug in the Win32k component.
"An attacker who successfully exploited this vulnerability could gain SYSTEM privileges," Microsoft disclosed in an advisory issued last month as part of Patch Tuesday updates.
If the amount of space we're adding to the start of the buffer is more than we have allocated, then it'll cause a kernel panic instead of continuing execution.
This means that any vulnerabilities that would ordinarily cause out-of-bounds behaviour (the good stuff) are now reduced to denial-of-service bugs.
While a denial-of-service bug may seem boring, the "remote" aspect usually associated with sk_buffs make them still pretty interesting. A remote kernel panic is still pretty fun!
Egy Windows 98 user véletlenül fogott egy OpenSSH bugot. Megihlette a felfedezés a biztonsági szakembereket és nekiálltak exploito(ka)t fejleszteni rá:
This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.
Demonstrating CVE-2022-37958 RCE Vuln. Reachable via any Windows application protocol that authenticates. Yes, that means RDP, SMB and many more. Please patch this one, it's serious! https://t.co/ikOrTvQIJspic.twitter.com/bOTmL5Fh2H
The vulnerability could allow attackers to remotely execute arbitrary code by accessing the NEGOEX protocol via any Windows application protocol that authenticates, such as Server Message Block (SMB) or Remote Desktop Protocol (RDP), by default. This list of affected protocols is not complete and may exist wherever SPNEGO is in use, including in Simple Message Transport Protocol (SMTP) and Hyper Text Transfer Protocol (HTTP) when SPNEGO authentication negotiation is enabled, such as for use with Kerberos or Net-NTLM authentication.
Unlike the vulnerability (CVE-2017-0144) exploited by EternalBlue and used in the WannaCry ransomware attacks, which only affected the SMB protocol, this vulnerability has a broader scope and could potentially affect a wider range of Windows systems due to a larger attack surface of services exposed to the public internet (HTTP, RDP, SMB) or on internal networks. This vulnerability does not require user interaction or authentication by a victim on a target system.
"Kedves ügyfeleink! Honlapunkon, alkalmazásainkon (Telekom alkalmazás, TVGO, Mobilvásárlás), webmail szolgáltatásunkon, valamint ügyfélszolgálati csatornáinkon (1414, 1400, 1777) átmeneti technikai hiba lépett fel, melyek javítását illetékes munkatársaink már megkezdték. A technikai hiba Telekom TV ügyfeleink szolgáltatását is érinti.
Köszönjük a megértést, a hiba javításáig türelmetek kérjük! Amint a hiba elhárult, ezen a csatornán tájékoztatni fogunk benneteket!"
A Randorisec részéről Arthur Mongodin egy, a Linux kernel Netfilter alrendszében levő heap buffer overflow sérülékenységet (CVE-2022-34918) elemez ki itt. A sérülékenység sikeres kihasználása a helyi, emelt szintű privilégiumok nélküli támadót root jogokhoz juttathatja.